首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
It is shown that the following modification of the Steffensen procedurex n+1=x n ?k s (x n )f(x n ) (f[x n ,x n ?f(x n )])?1 (n=0,1,...) withk s (x)=(1?z s (x))?1,z s (x)=f(x) 2f[x?f(x),x,x+f(x)]×(f[x,x?f(x)])?2 is quadratically convergent to the root of the equation \(f(x) = (x - \bar x)^p g(x) = 0(p > 0,g(\bar x) \ne 0)\) . Furthermore \(\mathop {\lim }\limits_{n \to \infty } k_s (x_n ) = p\) holds.  相似文献   

2.
In this paper we characterize all algorithms for obtaining the coefficients of (Σn?1i=0xiui)(Σn?1i=0yiui) mod P(u), where P(u) is an irreducible po lynomial of degree n, which use 2n ? 1 multiplications. It is shown that up to equivalence, all such algorithms are obtainable by first obtaining the coefficients of the product of two polynomials, and then reducing modulo the irreducible polynomial.  相似文献   

3.
The conditional iterationx n+1 =sup (x n ,x n +x n (e?ax n )),y n?1 =inf (y n ,x n +y n (e?ax n )) generating sequences (x n ) and (y n ) is considered in partially ordered spaces. Under certain conditions it is shown, that the inversea ?1 of a positive elementa≧0 is monotonously enclosed in the sensex n ≦x n+1 ≦a ?1 ≦y n+1 ≦y n and that (x n ) and (y n ) converge toa ?1 quadratically.  相似文献   

4.
When objects are scattered at random in the plane or in space, some of them overlap to form clumps. It is the object of the present paper to study the asymptotic distribution of the number of clumps of given size and topological structure generated within the following model: Ifx 1, ...,x n are points in ? n andU=-U?? n is a symmetric set, then the pointsx i andx j are said tooverlap or rather to form aU-coincidence, ifx i ?x j U. Adjoining tox 1, ...,x n andU, the graphG(x 1, ...,x n ;U)?({1, ..., n}, {[i, j]:1≤ix i ?x j ∈U}), the so calledcoincidence-graph, we ask for the number of connected components of this graph isomorphic to a given graphH and call this numberL9x 1, ...x n ;U, H). In the paper, the asymptotic distribution ofL(...) under various assumptions about the distribution of the pointsx 1, ...,x n and the size ofU is studied. Depending on these assumptions, we prove that the asymptotic distribution ofL(...) is either Poisson or normal.  相似文献   

5.
In many real-life applications, physical considerations lead to the necessity to consider the smoothest of all signals that is consistent with the measurement results. Usually, the corresponding optimization problem is solved in statistical context. In this paper, we propose a quadratic-time algorithm for smoothing aninterval function. This algorithm, givenn+1 intervals x0, ..., x n with 0 ∈ x0 and 0 ∈ x n , returns the vectorx 0, ...,x n for whichx 0=x 0=0,x i ∈ x i , and Σ(x i+1?x i )2 → min.  相似文献   

6.
LetW itk(n) be the minimax complexity of selecting thek largest elements ofn numbersx 1,x 2,...,x n by pairwise comparisonsx i :x j . It is well known thatW 2(n) =n?2+ [lgn], andW k (n) = n + (k?1)lg n +O(1) for all fixed k ≥ 3. In this paper we studyW k (n), the minimax complexity of selecting thek largest, when tests of the form “Isx i the median of {x i ,x j ,x t }?” are also allowed. It is proved thatW2(n) =n?2+ [lgn], andW k (n) =n + (k?1)lg2 n +O(1) for all fixedk≥3.  相似文献   

7.
In negation-limited complexity, one considers circuits with a limited number of NOT gates, being motivated by the gap in our understanding of monotone versus general circuit complexity, and hoping to better understand the power of NOT gates. We give improved lower bounds for the size (the number of AND/OR/NOT) of negation-limited circuits computing Parity and for the size of negation-limited inverters. An inverter is a circuit with inputs x 1,…,x n and outputs ¬ x 1,…,¬ x n . We show that: (a) for n=2 r ?1, circuits computing Parity with r?1 NOT gates have size at least 6n?log?2(n+1)?O(1), and (b) for n=2 r ?1, inverters with r NOT gates have size at least 8n?log?2(n+1)?O(1). We derive our bounds above by considering the minimum size of a circuit with at most r NOT gates that computes Parity for sorted inputs x 1???x n . For an arbitrary r, we completely determine the minimum size. It is 2n?r?2 for odd n and 2n?r?1 for even n for ?log?2(n+1)??1≤rn/2, and it is ?3n/2??1 for rn/2. We also determine the minimum size of an inverter for sorted inputs with at most r NOT gates. It is 4n?3r for ?log?2(n+1)?≤rn. In particular, the negation-limited inverter for sorted inputs due to Fischer, which is a core component in all the known constructions of negation-limited inverters, is shown to have the minimum possible size. Our fairly simple lower bound proofs use gate elimination arguments in a somewhat novel way.  相似文献   

8.
Edge-pancyclicity and path-embeddability of bijective connection graphs   总被引:1,自引:0,他引:1  
An n-dimensional Bijective Connection graph (in brief BC graph) is a regular graph with 2n nodes and n2n−1 edges. The n-dimensional hypercube, crossed cube, Möbius cube, etc. are some examples of the n-dimensional BC graphs. In this paper, we propose a general method to study the edge-pancyclicity and path-embeddability of the BC graphs. First, we prove that a path of length l with dist(Xnxy) + 2 ? l ? 2n − 1 can be embedded between x and y with dilation 1 in Xn for xy ∈ V(Xn) with x ≠ y in Xn, where Xn (n ? 4) is a n-dimensional BC graph satisfying the three specific conditions and V(Xn) is the node set of Xn. Furthermore, by this result, we can claim that Xn is edge-pancyclic. Lastly, we show that these results can be applied to not only crossed cubes and Möbius cubes, but also other BC graphs except crossed cubes and Möbius cubes. So far, the research on edge-pancyclicity and path-embeddability has been limited in some specific interconnection architectures such as crossed cubes, Möbius cubes.  相似文献   

9.
First, on any sequence of real numbers (xλ), λ ? [? Λ1 + Λ] ? Z, the pseudo probability Pr(x, x′) of the event xλ?[x, x′[ is defined to be the limit when Λ → ∞ of the ratio of the number of xλ?[x, x′[ to the total number of xλ. The a.d.f. (asymptotic distribution function) of the sequence is then defined by F(x) = Pr(? ∞, x); it possesses the properties of a d.f. (distribution function). Consequently, what is said below applies equally to a sequence of r.v. (random variables) or to a sequence of p.r.v. (pseudorandom variables) consisting of a sequence (nxλ), n ? [? N, + N] ? Z of sequences nxλ, λ ? [? Λ, + Λ] ? Z.A weyl's polynomial ?n(λ) is a polynomial such that one of its coefficieints other than ?(0) is irrational. Then any sequence, the fractional part of ?n(λ), λ ? [? Λ, + Λ] ? Z, is asymptotically equidistributed on [0, 1].A property is given which permits the construction of a sequence (nxλ), n ? [? N, + N] ? Z of pseudostochastically independent sequences nxλ, λ ? [? Λ, + Λ] ? Z.It is known that setting Yn = F(? 1)(Xn), it is possible to transform any sequence of r.v. Xn  相似文献   

10.
The following search game is considered: there are two players, say Paul (or questioner) and Carole (or responder). Carole chooses a number x*Sn={1,2,…,n}, Paul has to find the number x* by asking q-ary bi-interval queries and Carole is allowed to lie at most once throughout the game. The minimum worst-case number LB(n,q,1) of q-ary bi-interval queries necessary to guess the number x* is determined exactly for all integers n?1 and q?2. It turns out that LB(n,q,1) coincides with the minimum worst-case number L(n,q,1) of arbitrary q-ary queries.  相似文献   

11.
The aim of this paper is to generalize a result given by Curry and Feys, who have shown that the only regular combinators possessing inverse in the λ-β-η-calculus are the permutators, whose definition is p=λzλx1λxn(zxi1xin) for n?0 where i1,…, ir is a permutation of 1,…, n. Here we extend this characterization to the set of normal forms, showing that the only normal forms possessing inverse in the λ-βη-calculus are the “hereditarily finite permutators” (h.f.p.), whose recursive definition is: if n?0, Pj (1?j?n) are h.f.p. and i1,…,in is a permutation of 1,…, n, then the normal form of P = λzλx1λxn(z(P1xi1))… (Pnin) is an h.f.p.  相似文献   

12.
We prove that there is a polynomial time substitution (y1,…,yn):=g(x1,…,xk) with k?n such that whenever the substitution instance A(g(x1,…,xk)) of a 3DNF formula A(y1,…,yn) has a short resolution proof it follows that A(y1,…,yn) is a tautology. The qualification “short” depends on the parameters k and n.  相似文献   

13.
Loveland and Meyer have studied necessary and sufficient conditions for an infinite binary string x to be recursive in terms of the program-size complexity relative to n of its n-bit prefixes xn. Meyer has shown that x is recursive iff ?c, ?n, K(xn?n) ? c, and Loveland has shown that this is false if one merely stipulates that K(xn?n) ? c for infinitely many n. We strengthen Meyer's theorem. From the fact that there are few minimal-size programs for calculating n given result, we obtain a necessary and sufficient condition for x to be recursive in terms of the absolute program-size complexity of its prefixes: x is recursive iff ?c, ?n, K(xn) ? K(n) + c. Again Loveland's method shows that this is no longer a sufficient condition for x to be recursive if one merely stipulates that K(xn) ? K(n) + c for infinitely many n.  相似文献   

14.
A detailed study is undertaken, using various techniques, in deriving analytical formula of Franck-Condon overlap integrals and matrix elements of various functions of power (xl), exponential (exp(−2cx)) and Gaussian (exp(−cx2)) over displaced harmonic oscillator wave functions with arbitrary frequencies. The results suggested by previous experience with various algorithms are presented in mathematically compact form and consist of generalization. The relationships obtained are valid for the arbitrary values of parameters and the computation results are in good agreement with the literature. The numerical results illustrate clearly a further reduction in calculation times.

Program summary

Program name:FRANCKCatalogue identifier:ADXX_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADXX_v1_0Program obtainable from: CPC Program Library, Queen's University of Belfast, N. IrelandProgramming language:Mathematica 5.0Computer:Pentium M 1.4 GHzOperating system:Mathematica 5.0RAM:512 MBNo. of lines in distributed program, including test data, etc.:825No. of bytes in distributed program, including test data, etc.:16 344Distribution format:tar.gzNature of problem:The programs calculate the Franck-Condon factors and matrix elements over displaced harmonic oscillator wave functions with arbitrary quantum numbers (n,n1), frequencies (a,a1) and displacement (d) for the various functions of power (xl), exponential (exp(−2cx)) and Gaussian (exp(−cx2)).Solution method:The Franck-Condon factors and matrix elements are evaluated using binomial coefficients and basic integrals.Restrictions:The results obtained by the present programs show great numerical stability for arbitrary quantum numbers (n,n1), frequencies (a,a1) and displacement (d).Unusual features:NoneRunning time:As an example, for the value of Franck-Condon Overlap Integral Inn(d;α,α)=0.004405001887372332 with n=3, n1=2, a=4, a1=3, d=2, the compilation time in a Pentium M 1.4 GHz computer is 0.18 s. Execution time depends on the values of integral parameters n, n, d, α, α.  相似文献   

15.
Dr. G. Merz 《Computing》1974,12(3):195-201
Using generating functions we obtain in the case ofn+1 equidistant data points a method for the calculation of the interpolating spline functions(x) of degree 2k+1 with boundary conditionss (κ) (x0)=y 0 (κ) ,s (κ) (x n )=y n (κ) , κ=1(1)k, which only needs the inversion of a matrix of orderk. The applicability of our method in the case of general boundary conditions is also mentioned.  相似文献   

16.
We consider the problem of maintaining information about the rank of a matrix M under changes to its entries. For an n×n matrix M, we show an amortized upper bound of O(n ω?1) arithmetic operations per change for this problem, where ω<2.373 is the exponent for matrix multiplication, under the assumption that there is a lookahead of up to Θ(n) locations. That is, we know up to the next Θ(n) locations (i 1,j 1),(i 2,j 2),…?, whose entries are going to change, in advance; however we do not know the new entries in these locations in advance. We get the new entries in these locations in a dynamic manner. The dynamic matrix rank problem was first studied by Frandsen and Frandsen who showed an upper bound of O(n 1.575) and a lower bound of Ω(n) for this problem and later Sankowski showed an upper bound of O(n 1.495) for this problem when allowing randomization and a small probability of error. These algorithms do not assume any lookahead. For the dynamic matrix rank problem with lookahead, Sankowski and Mucha showed a randomized algorithm (with a small probability of error) that is more efficient than these algorithms.  相似文献   

17.
This paper proposes a method for finding solutions of arbitrarily nonlinear systems of functional equations through stochastic global optimization. The original problem (equation solving) is transformed into a global optimization one by synthesizing objective functions whose global minima, if they exist, are also solutions to the original system. The global minimization task is carried out by the stochastic method known as fuzzy adaptive simulated annealing, triggered from different starting points, aiming at finding as many solutions as possible. To demonstrate the efficiency of the proposed method, solutions for several examples of nonlinear systems are presented and compared with results obtained by other approaches. We consider systems composed of n   equations on Euclidean spaces ?n?n (n variables: x1, x2, x3, ? , xn).  相似文献   

18.
Dr. O. Hájek 《Computing》1977,18(2):177-183
The number of roots, on an interval of lengthT, ofc′ e At b?0 is at most (n-1)[T ω/π]*, wheren is the dimension ofA, b, c; ω is the largest imaginary part of eigenvalue ofA, and [x]* denotes the smallest integerk≥x.  相似文献   

19.
The Lovász ?-function (Lovász in IEEE Trans. Inf. Theory, 25:1–7, 1979) of a graph G=(V,E) can be defined as the maximum of the sum of the entries of a positive semidefinite matrix X, whose trace Tr(X) equals 1, and X ij =0 whenever {i,j}∈E. This function appears as a subroutine for many algorithms for graph problems such as maximum independent set and maximum clique. We apply Arora and Kale’s primal-dual method for SDP to design an algorithm to approximate the ?-function within an additive error of δ>0, which runs in time $O(\frac{\vartheta ^{2} n^{2}}{\delta^{2}} \log n \cdot M_{e})$ , where ?=?(G) and M e =O(n 3) is the time for a matrix exponentiation operation. It follows that for perfect graphs G, our primal-dual method computes ?(G) exactly in time O(? 2 n 5logn). Moreover, our techniques generalize to the weighted Lovász ?-function, and both the maximum independent set weight and the maximum clique weight for vertex weighted perfect graphs can be approximated within a factor of (1+?) in time O(? ?2 n 5logn).  相似文献   

20.
In many real-life situations, we want to reconstruct the dependencyy=f(x 1,…, xn) from the known experimental resultsx i (k) , y(k). In other words, we want tointerpolate the functionf from its known valuesy (k)=f(x 1 (k) ,…, x n (k) ) in finitely many points $\bar x^{(k)} = (x_1^{(k)} , \ldots ,x_n^{(k)} )$ , 1≤kN There are many functions that go through given points. How to choose one of them? The main goal of findingf is to be able to predicty based onx i. If we getx i from measurements, then usually, we only getintervals that containx i. As a result of applyingf, we get an interval y of possible values ofy. It is reasonable to choosef for which the resulting interval is the narrowest possible. In this paper, we formulate this choice problem in mathematical terms, solve the corresponding problem for several simple cases, and describe the application of these solutions to intelligent control.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号